What is a Claim?
Unlock flexible, cross-platform authorization in Nodinite v7 by understanding Claims. This page explains how Claims provide the foundation for modern authorization when using OIDC/OAuth 2.0 authentication mode.
✅ Platform-independent authorization model
✅ Flexible key/value pairs for any permission structure
✅ Integration with external identity providers
✅ Foundation for Policy-based access control
Note
Claims are only available when Nodinite is configured for OIDC/OAuth 2.0 authentication mode. For Windows authentication mode, use Users and Windows AD Groups instead.
Get started now: Add or manage Claim user guide.
What is a Claim?
A Claim in Nodinite is a key/value pair that represents a specific permission, attribute, or characteristic used for authorization. Claims are the fundamental building blocks of the OIDC/OAuth 2.0 authorization model.
Example Claims:
| Key | Value | Description |
|---|---|---|
department |
finance |
Finance Department member |
department |
operations |
Operations Department member |
access_level |
admin |
Administrator access level |
access_level |
readonly |
Read-only access level |
region |
europe |
European region |
role |
developer |
Developer role |

Example of the Claims management page showing various claims in the Nodinite Web Client.
Authorization Flow with Claims
Understanding how Claims fit into the authorization model:
- Claims - Individual key/value pairs (e.g.,
department=finance) - Policies - Groups of related Claims (e.g., "Finance Access Policy")
- Roles - Assigned Policies to grant permissions (e.g., "Finance User" role)
- Users - Authenticated via identity provider, receive Claims
- Authorization - Nodinite matches user Claims with Policy requirements
Key Characteristics
Unique Key/Value Combinations
The combination of Key and Value must be unique across all Claims:
- ✅ Allowed:
department=financeanddepartment=hr(different values) - ✅ Allowed:
access_level=adminandregion=admin(different keys) - ❌ Not allowed: Two Claims with
department=finance
Case Sensitivity
Claims are case-sensitive:
Department=Finance≠department=financeROLE=Admin≠role=admin
Tip
Use consistent lowercase naming conventions for Keys to avoid confusion.
Source of Claims
Claims can originate from:
- Identity Provider - Claims provided by your OIDC provider (Azure AD, Okta, etc.)
- Nodinite Configuration - Claims you define directly in Nodinite
- Hybrid - Combination of both sources
Claim Management
You can manage Nodinite Claims from the Administration section in the Nodinite Web Client:

Example of the Claims menu item in the Administration sidebar.
Available Operations
- Add new Claim - Create Claims inline
- Edit Claim - Modify Key, Value, or Description
- Delete Claim - Remove Claims (can be restored)
- Restore Claim - Recover deleted Claims
- Filter Claims - Search by Key, Value, or Description
- View Usage - See which Policies use each Claim
Claims vs. Users/Groups
OIDC/OAuth 2.0 Mode (Claims)
Advantages:
- Platform-independent (works with any identity provider)
- Flexible key/value structure
- Cloud-native and modern
- Supports external identity providers
Use when:
- Cloud-based deployments
- Multi-platform environments
- Integration with Azure AD, Okta, Auth0, etc.
- Need modern authentication protocols
Windows Authentication Mode (Users/Groups)
Advantages:
- Direct Active Directory integration
- Familiar Windows security model
- No additional configuration needed
Use when:
- On-premises deployments
- All users in Windows domain
- Traditional Windows-integrated security
Important
You cannot mix modes. Nodinite uses either Windows authentication (Users/Groups) or OIDC/OAuth 2.0 (Claims/Policies), configured during installation.
Best Practices
Naming Conventions
Use clear, consistent naming:
✅ Good Examples:
department=finance
access_level=admin
region=europe
environment=production
❌ Poor Examples:
Dept=Fin
LVL=1
EU=yes
Descriptive Documentation
Always provide a Description for each Claim:
- Explains the purpose of the Claim
- Helps other administrators understand usage
- Documents business logic
Example:
- Key:
department - Value:
finance - Description: "Member of the Finance Department - grants access to financial integrations and reporting"
Logical Grouping
Plan Claims that will be grouped into Policies:
Finance Access Policy:
department=financeaccess_level=readonlyregion=europe
Finance Admin Policy:
department=financeaccess_level=adminregion=all
Review Before Deletion
Before deleting a Claim:
- Check the "Used In" column - shows which Policies reference this Claim
- Consider the impact on existing Policies
- Deleted Claims remain visible in Policies (marked as deleted)
- Can be restored if needed
Common Scenarios
Department-Based Access
Claim 1: department=finance
Claim 2: department=operations
Claim 3: department=hr
Policy "Finance Access":
- Contains: department=finance
Policy "Operations Access":
- Contains: department=operations
Multi-Level Permissions
Claim 1: access_level=readonly
Claim 2: access_level=editor
Claim 3: access_level=admin
Policy "Read Access":
- Contains: access_level=readonly
Policy "Full Access":
- Contains: access_level=admin
- Contains: department=it
Regional Authorization
Claim 1: region=europe
Claim 2: region=americas
Claim 3: region=asia
Policy "European Integration Access":
- Contains: region=europe
- Contains: access_level=editor
Integration with Identity Provider
When using external identity providers:
Azure AD (Entra ID)
Claims can be mapped from Azure AD attributes:
- Group membership →
group=finance-users - Custom attributes →
department=finance - App roles →
role=admin
See Register Nodinite Applications in Azure AD for configuration details.
Other OIDC Providers
Configure claim mapping in your identity provider:
- Okta custom claims
- Auth0 user metadata
- Custom OIDC provider attributes
Troubleshooting
Cannot Create Duplicate Claim
Issue: Error when creating a Claim with an existing Key/Value combination
Solution: This Key/Value combination already exists. Either:
- Use the existing Claim in your Policy
- Choose a different Key or Value
- Check if the Claim was deleted (enable "Show Deleted" filter)
Claim Not Appearing for Users
Issue: User doesn't have expected permissions despite Claim configuration
Check:
- Is the Claim included in a Policy?
- Is the Policy assigned to a Role?
- Does the user's identity provider provide this Claim?
- Is the Claim key/value exact match (case-sensitive)?
Deleted Claim Still Visible
Issue: Deleted Claim appears in Policies
Explanation: This is expected behavior. Deleted Claims remain referenced in Policies to maintain audit trail.
Solution:
- Edit the Policy to remove the deleted Claim
- Add a replacement Claim if needed
- Or restore the deleted Claim
Security Considerations
Principle of Least Privilege
Create specific Claims for granular permissions:
✅ Specific:
department=finance
access_level=readonly
view=invoices
❌ Too broad:
access=all
permission=everything
Regular Audits
- Review Claims periodically
- Remove unused Claims
- Update descriptions
- Verify Policy assignments
Claim Validation
When users authenticate:
- Nodinite validates Claim keys and values
- Case-sensitive matching
- Exact match required
- No partial matching
Quick Facts
- Claims are key/value pairs used for authorization
- Available only in OIDC/OAuth 2.0 mode
- Key/Value combination must be unique
- Claims are case-sensitive
- Claims are grouped into Policies
- Policies are assigned to Roles
- Can originate from identity provider or be defined in Nodinite
- Deleted Claims can be restored
- Always provide a Description for clarity
Next Step
Add or manage Claim
What is a Policy?
What is a Role?
Install Nodinite v7 - OpenID Connect
Related Topics
Authorization Components:
Claims Overview - Manage all Claims
Policies - Group Claims into Policies
Policies Overview - Manage all Policies
Roles - Assign Policies to Roles
Roles Overview - Manage all Roles
Configuration:
Install Nodinite v7 - OpenID - Configure OIDC/OAuth 2.0
Install Nodinite v7 - OpenID - EntraID - Azure AD setup
Access Management - Overview of authorization
Windows Mode Alternative:
Users - Windows authentication mode
Windows AD Groups - Windows authentication mode